Open-core · Self-hostable · MCP-native

Your AI agents
have god-mode
access to your data.

It's time to fix that.

Scopegate is a permission gateway between your AI agents and external services. Define granular scopes per agent, get a secure MCP endpoint, and log every action — in under 5 minutes.

No credit card requiredFree tier foreverMIT Licensed
agent-setup.ts
Agent secured in 4m 32s
0 security incidents
88%

of organizations experienced AI agent security incidents

90%+

of MCP servers are over-permissioned by default

34%

of companies have any AI security controls in place

97M+

monthly MCP SDK downloads and growing 58× year-over-year

Sources: Gravitee State of AI Agent Security 2026 · Clutch Security · MCP Anniversary Blog · Noma Security

The problem

AI agents have become
authorization bypass paths

Authorization is evaluated against the agent's identity, not the requester's. Traditional security controls are insufficient for autonomous agents that reason instead of execute.

No scope control

MCP servers request broad OAuth scopes with no mechanism to restrict what each individual AI agent can actually do. Agent A and Agent B both get full access — or nothing at all.

No audit trail

Who can tell you what your AI agent did at 3am? MCP has no standardized logging. If something goes wrong — a deletion, an unauthorized send — you have no way to reconstruct it.

No instant revocation

When you need to cut off an agent, you're hunting through Google IAM, Slack settings, Notion, and GitHub separately. There's no single kill-switch that works across all services.

Agents quietly accumulate permissions as their scope expands. Integrations are added, roles change, teams come and go — but the agent's access remains.

— The Hacker News, “Who Approved This Agent?”

How it works

Secure in under 5 minutes

No Kubernetes. No enterprise procurement. No “contact sales” form. Just connect, configure, and ship.

01

Connect a service

One-click OAuth to connect Google Drive, Gmail, Calendar, Sheets, Slack, Notion, and more. No manual token management.

scopegate connect google-drive → OAuth flow complete ✓

OAuth 2.0 · Auto token refresh · Encrypted at rest

02

Define agent scopes

Set exactly what each agent can do: read-only, specific folder paths, rate limits per service. Visual toggle matrix — no YAML required.

Agent: "sales-assistant" drive: read /Marketing/* rate: 100 req/min ✓

Per-agent · Per-service · Folder-level · Rate limits

03

Copy your MCP endpoint

A unique, scoped MCP endpoint URL is generated. Paste it into your agent config. The proxy handles enforcement, logging, and revocation.

mcp.scopegate.cloud/sg_k9x2 → Agent ready in 4m 32s ✓

Instant activation · Works with any MCP client · Audit trail live

Features

The missing permission layer
for the MCP ecosystem

Per-agent, per-service granular scope control

Every agent gets its own permission profile. Define exactly which services it can access, which scopes it has, and what it's rate-limited to. Not team-level. Not org-level. Per agent.

Permission matrix
AgentDriveGmailCalendar
sales-assistantread /Salessend-onlyread
hr-botread /HRread+write
dev-agent
Folder-level scopesRate limits per agentDefault denyInstant toggle

5-min developer onboarding

No Kubernetes. No Entra ID. No platform team. One OAuth click, one config line, one MCP URL. You're live.

  • Visual toggle matrix
  • YAML config option
  • Auto-generated endpoint

Instant cross-service revocation

One click. All services. The proxy stops forwarding immediately — no waiting for OAuth tokens to expire.

  • All services at once
  • Automated triggers
  • Recorded in audit log

Full audit trail

Every tool call logged: action, params, status, error, duration. Queryable, exportable, and retention-configurable.

  • Every request logged
  • SOC 2 ready
  • 7–365 day retention

Integrations

Works with the tools
your team already uses

Each integration is a scoped MCP endpoint. Add a new service in seconds.

Google Drive
Gmail
Google Calendar
Google Sheets
Slack
Notion
GitHub
Twitter / X
OpenRouter
LinkedIn
Google Ads
More coming

Don't see your service? Request an integration →

Pricing

Simple, transparent pricing
that scales with your agents

MonthlyAnnualsave 20%

Free

Free

Get started with one agent, no card needed.

Start free
  • 1 project
  • 5 MCP endpoints
  • 1,000 requests / month
  • Google Drive, Gmail, Calendar
  • Basic audit log (7-day retention)
  • Community support

Pro

$29/mo

For solo developers shipping production agents.

Start Pro trial
  • 5 projects
  • 25 MCP endpoints
  • 50,000 requests / month
  • All integrations
  • Audit log (90-day retention)
  • Rate limits per agent
  • Email support
Most popular

Team

$149/mo

For teams with multiple agents and shared governance.

Start Team trial
  • Unlimited projects
  • 100 MCP endpoints
  • 500,000 requests / month
  • All integrations
  • Audit log (365-day retention)
  • Org-level permission policies
  • Up to 10 team members
  • SAML SSO (coming soon)
  • Priority support

Enterprise

Custom

Custom limits, compliance, and dedicated support.

Contact sales
  • Everything in Team
  • Unlimited endpoints & requests
  • Custom retention policies
  • SOC 2 Type II report
  • EU AI Act compliance package
  • SLA guarantee
  • Dedicated Slack channel
  • Custom integrations
  • On-prem / VPC deployment

All plans include SSL encryption, 99.9% uptime SLA, and GDPR-compliant data handling.
Prefer to self-host? →

From the community

Developers are already
asking for this

I'm building an AI agent that helps users organize their Google Drive, but I'm terrified of the liability if the agent accidentally deletes something. I need to restrict it to read-only on specific folders — but there's no way to do that today.

AD

AI Agent Developer

Indie developer, shipped 3 agents

I have 30 developers, and at least 20 of them have connected Claude Code to our Google Workspace. I have zero visibility into what these agents can access. Last week someone accidentally had their agent archive 200 emails.

EM

Engineering Manager

Series A SaaS company

Every enterprise prospect asks: 'Can you limit what your AI agent sees?' Right now, our answer is 'sort of.' That's a deal-breaker for Fortune 500s. We lose deals over this every quarter.

CT

AI Startup CTO

B2B AI automation platform

Compiled from developer interviews, Hacker News threads, and Reddit discussions.

FAQ

Common questions

MCP (Model Context Protocol) is Anthropic's open standard that lets AI agents call external tools — read files, send emails, query databases. By design, MCP servers request broad OAuth scopes with no built-in mechanism to restrict access per agent. Scopegate sits in front of your MCP servers and enforces fine-grained, per-agent permissions so each agent can only do exactly what it's supposed to.

OAuth scopes are binary: an app either has access or it doesn't. Scopegate adds a second layer on top: folder-level read restrictions within Google Drive, send-only Gmail (no read), calendar read-only per agent, rate limits per agent per service, and instant cross-service revocation without touching OAuth at all. You get granular control that OAuth alone can't provide.

Yes — Scopegate acts as a transparent proxy. Tool call requests from your agent route through our infrastructure, are checked against your permission policy, and forwarded to the target service. The response is returned to your agent. We log metadata (action, params, status, duration) but do not store the actual payload contents. Enterprise customers can opt for VPC deployment to keep all traffic within their own infrastructure.

Yes. The core Scopegate engine is open-source (MIT license) and available at github.com/alifanov/scopegate. You can run it yourself with no usage limits. Scopegate Cloud adds multi-tenancy, team management, SSO, compliance exports, and hosted reliability on top. Self-hosting documentation is at /docs/self-hosting.

Currently: Google Drive, Gmail, Google Calendar, Google Sheets, Slack, Notion, GitHub, Twitter/X, LinkedIn, Google Ads, and OpenRouter. We're adding new integrations every few weeks. Each integration is an MCP endpoint — if you need one that isn't listed, you can request it on GitHub or implement a custom connector using our SDK.

We are actively pursuing SOC 2 Type II certification (expected Q3 2026). Enterprise customers receive a copy of our security questionnaire responses, penetration test results, and data processing agreement. The audit log format is designed to support SOC 2 and EU AI Act Article 13 transparency requirements out of the box.

Still have questions? Email us →

Start securing your AI agents
in 5 minutes

No credit card required. No Kubernetes. No enterprise procurement.
Connect your first service and get a scoped MCP endpoint today.

Free forever tierNo credit card requiredOpen-source coreGDPR compliant